CN111667253B - Security processing method and device - Google Patents

Security processing method and device Download PDF

Info

Publication number
CN111667253B
CN111667253B CN202010615276.6A CN202010615276A CN111667253B CN 111667253 B CN111667253 B CN 111667253B CN 202010615276 A CN202010615276 A CN 202010615276A CN 111667253 B CN111667253 B CN 111667253B
Authority
CN
China
Prior art keywords
security
item
modified
security item
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010615276.6A
Other languages
Chinese (zh)
Other versions
CN111667253A (en
Inventor
赵佳鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Life Insurance Co ltd
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Life Insurance Co ltd
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Life Insurance Co ltd, Taikang Insurance Group Co Ltd filed Critical Taikang Life Insurance Co ltd
Priority to CN202010615276.6A priority Critical patent/CN111667253B/en
Publication of CN111667253A publication Critical patent/CN111667253A/en
Application granted granted Critical
Publication of CN111667253B publication Critical patent/CN111667253B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance

Abstract

The application provides a method and a device for security treatment. The method comprises the following steps: the method comprises the steps of receiving a security request, wherein the security request is used for requesting to modify a first security item in a security list, determining at least one second security item according to the security request and a security item correlation rule, outputting a security item to be modified, the security item to be modified comprises the first security item and at least one second security item related to the first security item, receiving modified content of the security item to be modified by a terminal device, and completing security operation according to the modified content of the security item to be modified. According to the method provided by the application, when the client requests to modify the first security item in the security list, the modification of the second security item related to the first security item can be simultaneously carried out, so that the security processing time is shortened, and the client experience is improved.

Description

Security processing method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for security processing.
Background
During the validity period of the insurance contract, that is, during the life cycle of the insurance policy, the insurance company can provide the customer with the insurance policy-preserving service. The policy preservation is to change the related information of the policy. For example, customer survival funds receive authorization, add premium, and the like.
When the client handles the change of the policy information, only one security procedure can be performed at a time, and the next security procedure can be performed after one security procedure is completed, for example, the client needs to perform the security procedure of changing the basic information of the client if the client wants to modify the basic information, and the client needs to perform the security procedure of taking the full-term money if the client wants to take the full-term money, and various security items have respective independent security procedures.
When a client performs a certain security, a plurality of related security flows cannot be performed at the same time, the security change is long in time consumption, and the client experience is not high.
Disclosure of Invention
The application provides a security processing method and device, which are used for solving the problems that a plurality of related security processes cannot be performed simultaneously when a client performs a certain security, the security change is long in time consumption, and the client experience is not high.
In a first aspect, the present application provides a method of security processing, including:
receiving a security request, wherein the security request is used for requesting to modify a first security item in a security policy;
determining at least one second security item according to the security request and the security item correlation rule, wherein the second security item is a security item related to the first security item;
outputting a security item to be modified, wherein the security item to be modified comprises the first security item and the at least one second security item;
receiving modified content of the security item to be modified;
and finishing the security operation according to the modified content of the security item to be modified.
Optionally, the determining at least one second security item according to the security request and the security item correlation rule includes:
determining whether to perform security operation on the first security item according to a security rule corresponding to the first security item, wherein the security rule corresponding to the first security item is used for indicating whether the first security item can perform security;
when determining to perform security operation on the first security item, determining at least one second security item related to the first security item.
Optionally, after determining at least one second security item related to the first security item when determining to perform a security operation on the first security item, the method further includes:
determining whether to perform security operation on the second security item according to a security rule corresponding to the second security item, wherein the security rule corresponding to the second security item is used for indicating whether the second security item can perform security;
and determining the first security item and the second security item which are subjected to security operation as the security item to be modified.
Optionally, the completing the security operation according to the modified content of the security item to be modified includes:
and sending the pre-modified content and the modified content of the security item to be modified to a server.
Optionally, the completing the security operation according to the modified content of the security item to be modified includes:
comparing the pre-modified content and the modified content of the to-be-modified security item in the security policy, and determining the modified target content of the to-be-modified security item;
and sending the modified target content of the security item to be modified to a server.
Optionally, after the security operation is completed according to the modified content of the security item to be modified, the method further includes:
and receiving modification result prompt information sent by a server, wherein the modification result prompt information is used for prompting whether the to-be-modified security item is successfully modified.
Optionally, the outputting the security item to be modified includes:
displaying a blank security list, wherein the content of the security items in the blank security list is a blank item, the blank security list comprises the security items to be modified, and the security items to be modified in the blank security list are displayed in a distinguishing mode from other security items.
In a second aspect, the present application provides an apparatus for security processing, including:
the first receiving module is used for receiving a security request, wherein the security request is used for requesting to modify a first security item in a security policy;
the determining module is used for determining at least one second security item according to the security request and the security item correlation rule, wherein the second security item is a security item related to the first security item;
the output module is used for outputting a security item to be modified, wherein the security item to be modified comprises the first security item and the at least one second security item;
the second receiving module is used for receiving the modified content of the security item to be modified;
and the security module is used for completing security operation according to the modified content of the security item to be modified.
Optionally, the determining module is specifically configured to:
determining whether to perform security operation on the first security item according to a security rule corresponding to the first security item, wherein the security rule corresponding to the first security item is used for indicating whether the first security item can perform security;
when determining to perform security operation on the first security item, determining at least one second security item related to the first security item.
Optionally, the determining module is further configured to:
determining whether to perform security operation on the second security item according to a security rule corresponding to the second security item, wherein the security rule corresponding to the second security item is used for indicating whether the second security item can perform security;
and determining the first security item and the second security item which are subjected to security operation as the security item to be modified.
Optionally, the security module is specifically configured to:
and sending the pre-modified content and the modified content of the security item to be modified to a server.
Optionally, the security module is specifically configured to:
comparing the pre-modified content and the modified content of the to-be-modified security item in the security policy, and determining the modified target content of the to-be-modified security item;
and sending the modified target content of the security item to be modified to a server.
Optionally, the apparatus further includes:
the third receiving module is used for receiving the modification result prompt information sent by the server, and the modification result prompt information is used for prompting whether the to-be-modified security item is successfully modified or not.
Optionally, the output module is specifically configured to:
displaying a blank security list, wherein the content of the security items in the blank security list is a blank item, the blank security list comprises the security items to be modified, and the security items to be modified in the blank security list are displayed in a distinguishing mode from other security items.
In a third aspect, the present application provides an apparatus for security processing, comprising: a memory and a processor;
a memory for storing the processor-executable instructions;
a processor for implementing the method as described in the first aspect above when the computer program is executed.
In a fourth aspect, the present application provides a computer-readable storage medium having stored therein computer-executable instructions which, when executed by a processor, are adapted to carry out a method of securing a process as described in the first aspect above.
The method and the device for security processing provided by the application are characterized in that the security request is received and used for requesting to modify a first security item in a security policy, at least one second security item is determined according to the security request and the security item correlation rule, the security item to be modified is output, the security item to be modified comprises the first security item and at least one second security item related to the first security item, the terminal equipment receives the modified content of the security item to be modified, and the security operation is completed according to the modified content of the security item to be modified. According to the method provided by the application, when the client requests to modify the first security item in the security list, the modification of the second security item related to the first security item can be simultaneously carried out, so that the security processing time is shortened, and the client experience is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a schematic diagram of a system architecture of a security process according to the present application;
FIG. 2 is a flow chart of a method for security processing according to the present application;
FIG. 3 is a diagram of an interface for displaying policy information;
FIG. 4 is a schematic diagram of an interface of a blank policy;
FIG. 5 is a schematic diagram of a security device according to the present application;
fig. 6 is a schematic structural diagram of a security processing apparatus according to the present application.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
First, the terms involved in the present application will be explained:
insurance policy: the insurance policy is referred to as a written proof of an insurance contract between an insurance person and an applicant, and in the embodiment of the present application, the insurance policy refers to an electronic insurance policy, rather than a paper insurance policy.
And (3) policy preservation: the method refers to changing the related information of the policy, and is hereinafter referred to as security.
In the prior art, the security items are numerous, and each security item may belong to different interfaces, so that the security processes are performed independently according to the security items, only one security process can be performed at a time, only one security item can be changed in one security process, and only the next security process can be performed after one security process is completed, for example, if a client wants to change basic information, the client needs to change the security process of basic information, and if the client wants to get full-term money, the client needs to perform the security process of full-term money, and in the same way, each security item has the independent security process. However, in some scenarios, after a client initiates a security procedure, if the client wants to modify the content of other security items related to the security procedure, the client needs to initiate other security procedures related to the security procedure after completing the security procedure, so that the security change takes a long time, and the client experience is not high. In other scenarios, the client wants to modify a security item, initiate a security flow, and complete the modification, but the client does not know that the security item associated with the security item is also to be modified, so that the security item associated with the security item is not modified, resulting in incomplete modification of the security item and low customer experience.
The method and the device for security processing provided by the application aim to solve the technical problems in the prior art, and through presetting the association rule of the security items, when a client requests to modify a first security item in a security policy, the modification of a second security item related to the first security item can be simultaneously carried out, so that the time of security processing is shortened, and the client experience is improved.
Fig. 1 is a schematic diagram of a system architecture of security processing, which is applicable to an embodiment of the present application, as shown in fig. 1, a system provided in this embodiment includes a terminal device 101 and a server 102. The terminal device 101 may be a computer, a mobile phone, a tablet device, etc., and the number of the terminal devices 101 may be plural. The server 102 stores therein client information, client policy information, and the like.
The client or the insurance agent thereof wants to initiate a security procedure, a security request is input to the terminal device 101, the terminal device 101 determines at least one second security item related to the first security item according to the security request and the security item correlation rule, the security item to be modified is output, the security item to be modified comprises the first security item and the at least one second security item, the client modifies the first security item according to the requirement, and can also modify the at least one second security item related to the first security item, the terminal device 101 receives the modified content of the security item to be modified, and completes the security operation according to the modified content of the security item to be modified, wherein the terminal device 101 can send the modified content of the security item to be modified to the server 102, the server 102 saves the modified content to the original security item in a replacement manner, and the server 102 completes the security operation.
Optionally, when the target security item in the security items to be modified cannot be modified, the server 102 processes the modification of the first security item and the modification of at least one second security item separately, where the target security item is a security item that cannot be modified in the security items to be modified, and if the target security item exists, the server 102 outputs a prompt message for prompting a customer service, and the prompt message is used for prompting the customer service to process the security information of the security items that cannot be modified, where the customer service can contact the customer for processing through the security items that cannot be modified. The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a flow chart of a method of security processing provided in the present application, as shown in fig. 2, the method of this embodiment is executed by a terminal device, where the terminal device may be a computer, a mobile phone, a tablet device, etc., and the method of this embodiment is not limited herein, and is as follows:
s201, a security request is received, wherein the security request is used for requesting modification of a first security item in a security policy.
When a customer needs to perform a security, the customer enters a client side or a webpage of an insurance company through a terminal device, optionally, the customer needs to perform identity verification before entering a security modification webpage of the insurance company through the terminal device so as to finish login, and the identity verification can be performed in a mode of an account number and a password or in a mode of a mobile phone verification code, so that the application is not limited.
The terminal device may send a client information acquisition request to the server, where the client information acquisition request is used to acquire client basic information and client policy information, the client information acquisition request includes client authentication information, the server determines, according to the client authentication information, the client basic information and the client policy information that match with the client authentication information, and sends the client basic information and the client policy information to the terminal device, and the terminal device displays the received client basic information and the client policy information, so that the client may view the client. The client initiates a security request for modifying the first security item according to the self requirement, and the security request is used for requesting to initiate the first security item. The customer policy information may be policy information of one or more policies, and the insurance includes life insurance, injury insurance, health insurance, and the like. The basic information of the client is a security item, one or more security items are included in each security policy, each security item includes one or more security information, fig. 3 is a schematic diagram of an interface for displaying the security policy information, as shown in fig. 3, the applicant information 301 is a security item, and the applicant information 301 includes the name, age, address, contact 302 and other security information of the applicant.
The client browses the client basic information and the client policy information, and triggers a security flow by triggering a security request, as shown in fig. 3, the client may trigger the security request by clicking a "modify" button 303 on the page, and the button may also be a button of other forms such as "initiate security", which is not limited to this application.
S202, determining at least one second security item according to the security request and the security item correlation rule.
Wherein the second security item is a security item associated with the first security item.
The security request comprises a first security item, and the terminal equipment determines at least one second security item according to the first security item and a preset security item correlation rule. The security item correlation rule is used for describing the correlation between the first security item and the second security item, that is, when the client needs to modify the first security item, the client may need to modify the second security item related to the first security item, and then determine the second security item according to the security item correlation rule, where the second security item may belong to the same security policy as the first security item or may belong to a different security policy from the first security item, which is not limited in this application.
Optionally, S202 may include S2021 and S2022:
s2021, determining whether to perform security operation on the first security item according to a security rule corresponding to the first security item, where the security rule corresponding to the first security item is used to indicate whether the first security item can perform security.
The security rule is preset, and is used for judging whether the current security item can be subjected to security operation, namely whether the current security item can be modified. Optionally, the security rule is stored in the server, after the terminal device receives the security request, the terminal device sends a request for modifying the first security item in the security request to the server, and optionally, the server may determine whether the first security item can be subjected to security operation according to the first security item and the security rule, and the server sends the determination result to the terminal device. The server may also determine a security rule corresponding to the first security item according to the first security item, send the security rule corresponding to the first security item to the terminal device, and the terminal device determines whether to perform a security operation on the first security item according to the security rule corresponding to the first security item.
Optionally, when it is determined that the first security item cannot be performed with a security operation, a prompt message that cannot be secured may be output, and the prompt message that cannot be secured may be a prompt or a prompt voice that indicates that the security cannot be performed at this time, such as "no play, no modification, and" modification failure. Meanwhile, the prompt information that the client cannot secure can also comprise the reason that the current security cannot operate, and can also comprise modification suggestions for clients and the like, so that the application is not limited. For example, the client initiates the security procedure of full-term gold acquisition, and determines that the client does not acquire the bonus according to the security rule, so that the client cannot perform the operation of full-term gold acquisition, and at this time, a prompt message "no-play, no-term gold acquisition at present, and request to acquire the bonus first" can be output.
S2022, when determining to perform a security operation on the first security item, determining at least one second security item related to the first security item.
When it is determined that the first security item can be operated on according to the security rule, at least one second security item related to the first security item is determined through the security item correlation rule.
Optionally, S2022 further includes S2023 and S2024:
s2023, determining whether to perform security operation on the second security item according to a security rule corresponding to the second security item, where the security rule corresponding to the second security item is used to indicate whether the second security item can perform security.
The second security items may be one or more items, and whether to perform security operation on the current second security item is determined according to the security rule corresponding to each second security item.
S2024, determining that the first security item and the second security item for performing the security operation are security items to be modified.
And determining the first security item and the second security item for performing the security operation as the security items to be modified.
Through the setting of the security rules, whether the security change initiated by the client can be operated or not can be judged, so that the efficiency of the security operation of the client is improved, and the user experience is improved.
S203, outputting a security item to be modified, wherein the security item to be modified comprises a first security item and at least one second security item.
And outputting and displaying the security items to be modified on the terminal equipment, wherein the security items to be modified are a first security item and at least one second security item related to the first security item.
For example, the policy migration refers to that, for reasons such as residence change or going to living and working in the foreign place, the application client makes an application to migrate the policy from the original signing authority to other institutions in the living place to continue to enjoy the rights and interests of the insurance contract and fulfill the obligation of the insurance contract, and if the client needs to perform policy migration, the client may also need to perform payment information change, contact information change, etc., so the security item correlation rule may be set as follows: the first security item is a policy migration, and the second security item related to the policy migration is a payment information change and a contact change. After receiving the policy migration request, the terminal equipment determines that the second security item related to the policy migration is payment information change and contact mode change according to the set security item correlation rule, and then the terminal equipment outputs and displays the policy migration item, the payment information and the contact mode.
And outputting the security items to be modified, wherein in one possible implementation manner, a blank security list is displayed, the content of the security items in the blank security list is the blank items, the blank security list comprises the security items to be modified, and the security items to be modified in the blank security list are displayed in a distinguishing manner from other security items.
Fig. 4 is an interface schematic diagram of a blank policy, where, as shown in fig. 4, the content 402 of a security item of the blank policy is a blank item, the applicant information 401 is a first security item, and the related second security item may be displayed under the security item of the applicant information 401, or different security items may be paged and displayed, and by clicking a "next page" button, a customer may fill in a security item to be modified, where the security item to be modified in the blank policy is in a state that can be filled in, and other security items may not be displayed, or may not be in a state that can be filled in.
In another possible implementation manner, all information of the security policy is displayed, the content of the security item in the security policy is the content before modification, the security item to be modified is included in the security policy, and the security item to be modified in the security policy is displayed in a different manner from other security items.
The full information of the display policy includes: all information of the security items to be modified in the security list can be displayed, other security items in the security list are not displayed, or all information of the security items to be modified and all information of other security items in the security list are displayed, the security items to be modified in the security list are in a modifiable state, a client can modify the security items to be modified, and the other security items are in an unmodified state.
S204, receiving modified content of the security item to be modified.
The terminal device receives the modified content of the to-be-modified security item input by the client, and may set a "modification completion" button in the modification page, where the "modification completion" button may be set in the lower right corner of the modification interface, or may be set in the upper right corner of the modification interface, and the setting position of the "modification completion" button is not limited by the present application.
S205, finishing the security operation according to the modified content of the security item to be modified.
In one possible implementation, the pre-modified content and the modified content of the security item to be modified are sent to the server.
And sending the pre-modified content and the modified content of the security item to be modified to the server in pairs, and judging which security items need to be modified by the server according to the contents submitted in pairs, so that the modification is completed according to the modified content.
In another possible implementation, the pre-modification content and the modified content of the security item to be modified in the policy are compared to determine a modified target content of the security item to be modified.
And sending the modified target content of the security item to be modified to the server.
If the blank policy output when the security item to be modified is output in S202, the server modifies the security item according to the content filled in by the client in the modified policy, if the full information of the policy output when the security item to be modified is output in S202, the server obtains the original information of the policy, compares the content filled in by the client in the modified policy with the original information of the policy, determines the modified content, and updates the information of the security item in the server according to the modified content.
In yet another possible implementation, the content of all the security items of the policy is sent to the server.
The content of the security item to be modified in the security policy comprises the content before modification and the content after modification, and the content of other security items in the security policy comprises the original content of the security item.
When the client modifies the content of the to-be-modified security item in the security policy, the content before modification and the content after modification of the to-be-modified security item in the security policy and the original content of other security items in the security policy are sent to the server, and when the client does not modify the content of the to-be-modified security item in the security policy, the original content of all the security items in the security policy is sent to the server.
The server determines the modified content according to the comparison of the content before modification and the content after modification, and updates the information of the corresponding security item in the server according to the content after modification.
Optionally, after the server successfully submits the modification of the security item to be modified, the server sends the successful information of the modification to the terminal device, and the terminal device displays and outputs the successful information of the modification to prompt the client that the modification is successful.
Optionally, after the server sends the success information of submission to the terminal device, the server sends the modification result prompt information to the terminal device, where the modification result prompt information is used to prompt whether the security item to be modified is successfully modified.
In this embodiment, the terminal device receives a security request, where the security request is used to request to modify a first security item in a policy, determines at least one second security item according to a security request and a security item correlation rule, outputs a security item to be modified, where the security item to be modified includes the first security item and at least one second security item related to the first security item, receives modified content of the security item to be modified, and completes a security operation according to the modified content of the security item to be modified. According to the method, when the client requests to modify the first security item in the security policy, modification of the second security item related to the first security item can be performed simultaneously, so that the time of security processing is shortened, and the client experience is improved.
Fig. 5 is a schematic structural diagram of a device for security processing according to the present application, and as shown in fig. 5, the device provided in this embodiment includes:
a first receiving module 501, configured to receive a security request, where the security request is used to request modification of a first security item in a policy;
a determining module 502, configured to determine at least one second security item according to the security request and the security item correlation rule, where the second security item is a security item related to the first security item;
an output module 503, configured to output a security item to be modified, where the security item to be modified includes a first security item and at least one second security item;
a second receiving module 504, configured to receive modified content of a security item to be modified;
the security module 505 is configured to complete a security operation according to the modified content of the security item to be modified.
Optionally, the determining module 502 is specifically configured to:
determining whether to perform security operation on the first security item according to a security rule corresponding to the first security item, wherein the security rule corresponding to the first security item is used for indicating whether the first security item can perform security;
when it is determined to perform a security operation on the first security item, at least one second security item associated with the first security item is determined.
Optionally, the determining module 502 is further configured to:
determining whether to perform security operation on the second security item according to a security rule corresponding to the second security item, wherein the security rule corresponding to the second security item is used for indicating whether the second security item can perform security;
and determining the first security item and the second security item for performing the security operation as the security items to be modified.
Optionally, the security module 505 is specifically configured to:
and sending the content before modification and the content after modification of the security item to be modified to the server.
Optionally, the security module 505 is specifically configured to:
comparing the pre-modification content and the modified content of the security item to be modified in the policy, and determining the modified target content of the security item to be modified;
and sending the modified target content of the security item to be modified to the server.
Optionally, the apparatus further comprises:
the third receiving module is used for receiving the modification result prompt information sent by the server, wherein the modification result prompt information is used for prompting whether the security item to be modified is successfully modified or not.
Optionally, the output module 503 is specifically configured to:
and displaying a blank policy, wherein the content of the security items in the blank policy is blank items, the blank policy comprises the security items to be modified, and the security items to be modified in the blank policy are displayed in a distinguishing manner from other security items.
The device of the above embodiment may be used to implement the technical solution of the above method embodiment, and its implementation principle and technical effects are similar, and are not repeated here.
Fig. 6 is a schematic structural diagram of a device for security processing according to the present application, as shown in fig. 6, where the device provided in this embodiment includes: a memory 601, and a processor 602.
A memory 601 for storing processor 602 executable instructions.
A processor 602 for implementing the method as in the above embodiments when the computer program is executed.
The present application provides a computer-readable storage medium having stored therein computer-executable instructions that, when executed by a processor, perform a method for performing a security process as described above.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (9)

1. A method of security processing, comprising:
receiving a security request, wherein the security request is used for requesting to modify a first security item in a security policy;
determining at least one second security item according to the security request and the security item correlation rule, wherein the second security item is a security item related to the first security item, and the security item correlation rule is set as follows: when the first security item is the policy migration, the second security item related to the policy migration is payment information change and contact information change;
outputting a security item to be modified, wherein the security item to be modified comprises the first security item and the at least one second security item;
receiving modified content of the security item to be modified;
according to the modified content of the security item to be modified, completing security operation;
the determining at least one second security item according to the security request and the security item correlation rule comprises the following steps:
determining whether to perform security operation on the first security item according to a security rule corresponding to the first security item, wherein the security rule corresponding to the first security item is used for indicating whether the first security item can perform security;
when determining to perform security operation on the first security item, determining at least one second security item related to the first security item;
and outputting prompt information when the fact that the first security item cannot be subjected to security operation is determined, wherein the prompt information comprises the reason that the current security cannot be operated and modification suggestions for clients.
2. The method of claim 1, wherein after determining at least one second security item to which the first security item relates when determining to perform a security operation on the first security item, further comprising:
determining whether to perform security operation on the second security item according to a security rule corresponding to the second security item, wherein the security rule corresponding to the second security item is used for indicating whether the second security item can perform security;
and determining the first security item and the second security item which are subjected to security operation as the security item to be modified.
3. The method according to claim 1 or 2, wherein said performing a security operation based on the modified content of the security item to be modified comprises:
and sending the pre-modified content and the modified content of the security item to be modified to a server.
4. The method according to claim 1 or 2, wherein said performing a security operation based on the modified content of the security item to be modified comprises:
comparing the pre-modified content and the modified content of the to-be-modified security item in the security policy, and determining the modified target content of the to-be-modified security item;
and sending the modified target content of the security item to be modified to a server.
5. The method according to claim 1 or 2, wherein after the completion of the security operation according to the modified content of the security item to be modified, further comprising:
and receiving modification result prompt information sent by a server, wherein the modification result prompt information is used for prompting whether the security item to be modified is successfully modified.
6. The method according to claim 1 or 2, wherein the outputting the security item to be modified comprises:
displaying a blank security list, wherein the content of the security items in the blank security list is a blank item, the blank security list comprises the security items to be modified, and the security items to be modified in the blank security list are displayed in a distinguishing mode from other security items.
7. An apparatus for securing a process, comprising:
the first receiving module is used for receiving a security request, wherein the security request is used for requesting to modify a first security item in a security policy;
the determining module is configured to determine at least one second security item according to a security request and a security item correlation rule, where the second security item is a security item related to the first security item, and the security item correlation rule is set to: when the first security item is the policy migration, the second security item related to the policy migration is payment information change and contact information change;
the output module is used for outputting a security item to be modified, wherein the security item to be modified comprises the first security item and the at least one second security item;
the second receiving module is used for receiving the modified content of the security item to be modified;
the security module is used for completing security operation according to the modified content of the security item to be modified;
the determining module is specifically configured to:
determining whether to perform security operation on the first security item according to a security rule corresponding to the first security item, wherein the security rule corresponding to the first security item is used for indicating whether the first security item can perform security;
when determining to perform security operation on the first security item, determining at least one second security item related to the first security item;
and outputting prompt information when the fact that the first security item cannot be subjected to security operation is determined, wherein the prompt information comprises the reason that the current security cannot be operated and modification suggestions for clients.
8. An apparatus for securing a process, comprising: a memory and a processor;
a memory for storing processor-executable instructions;
a processor for implementing the method of any of the preceding claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are adapted to implement the method of securing a process as claimed in any one of claims 1 to 6.
CN202010615276.6A 2020-06-30 2020-06-30 Security processing method and device Active CN111667253B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010615276.6A CN111667253B (en) 2020-06-30 2020-06-30 Security processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010615276.6A CN111667253B (en) 2020-06-30 2020-06-30 Security processing method and device

Publications (2)

Publication Number Publication Date
CN111667253A CN111667253A (en) 2020-09-15
CN111667253B true CN111667253B (en) 2023-08-29

Family

ID=72390573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010615276.6A Active CN111667253B (en) 2020-06-30 2020-06-30 Security processing method and device

Country Status (1)

Country Link
CN (1) CN111667253B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004185237A (en) * 2002-12-02 2004-07-02 Mitsui Sumitomo Insurance Co Ltd Insurance contract supporting server, insurance contract supporting system and insurance contract supporting method
JP2007011758A (en) * 2005-06-30 2007-01-18 Dai-Ichi Mutual Life Insurance Co Insurance data management device and method, and program
CN106056348A (en) * 2016-05-18 2016-10-26 平安科技(深圳)有限公司 Maintenance information change method and device
CN106570684A (en) * 2016-11-14 2017-04-19 平安科技(深圳)有限公司 Information changing method and information changing device
CN106649236A (en) * 2016-12-15 2017-05-10 平安科技(深圳)有限公司 Method and device for reminding modification
CN107644381A (en) * 2016-07-20 2018-01-30 平安科技(深圳)有限公司 Policy information amending method and device
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109242417A (en) * 2018-08-20 2019-01-18 中国平安财产保险股份有限公司 Declaration form batch modification method, apparatus, computer equipment and storage medium
CN109284975A (en) * 2018-09-04 2019-01-29 中国平安财产保险股份有限公司 Policy information batch modification method, apparatus, computer equipment and storage medium
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090313049A1 (en) * 1999-12-18 2009-12-17 Raymond Anthony Joao Apparatus and Method for Processing and/or Providing Healthcare Information and/or Healthcare-Related Information
US8805718B2 (en) * 2010-07-15 2014-08-12 Hartford Fire Insurance Company Systems and methods for collecting insurance-related data

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004185237A (en) * 2002-12-02 2004-07-02 Mitsui Sumitomo Insurance Co Ltd Insurance contract supporting server, insurance contract supporting system and insurance contract supporting method
JP2007011758A (en) * 2005-06-30 2007-01-18 Dai-Ichi Mutual Life Insurance Co Insurance data management device and method, and program
CN106056348A (en) * 2016-05-18 2016-10-26 平安科技(深圳)有限公司 Maintenance information change method and device
CN107644381A (en) * 2016-07-20 2018-01-30 平安科技(深圳)有限公司 Policy information amending method and device
CN106570684A (en) * 2016-11-14 2017-04-19 平安科技(深圳)有限公司 Information changing method and information changing device
CN106649236A (en) * 2016-12-15 2017-05-10 平安科技(深圳)有限公司 Method and device for reminding modification
CN108765175A (en) * 2018-06-01 2018-11-06 中国平安人寿保险股份有限公司 Declaration form saves information processing method, device, computer equipment and storage medium from damage
CN109242417A (en) * 2018-08-20 2019-01-18 中国平安财产保险股份有限公司 Declaration form batch modification method, apparatus, computer equipment and storage medium
CN109284975A (en) * 2018-09-04 2019-01-29 中国平安财产保险股份有限公司 Policy information batch modification method, apparatus, computer equipment and storage medium
CN109670968A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Processing method, device, equipment and the computer storage medium of insurance data

Also Published As

Publication number Publication date
CN111667253A (en) 2020-09-15

Similar Documents

Publication Publication Date Title
US20200211121A1 (en) Credit-based claim settlement implementing method and device
JP6585301B2 (en) Dynamic update of CAPTCHA challenge
US9015804B2 (en) Mobile human challenge-response test
US20190222573A1 (en) System and method for biometric authentication using social network
CN109544135B (en) Bank card binding method and device, storage medium and mobile terminal
CN106779716B (en) Authentication method, device and system based on block chain account address
US8650627B2 (en) Computer implemented system and method for providing challenge-response solutions to authenticate a user
CN108846676A (en) Biological characteristic assistant payment method, device, computer equipment and storage medium
CN104077689A (en) Information verification method, relevant device and system
US20160350849A1 (en) Computerized method and system of credit application and issuance thereof
CN111275448A (en) Face data processing method and device and computer equipment
CN106067849A (en) A kind of digital signature method being applicable to PDF document and device
CN110210207A (en) Authorization method and equipment
CN111210190A (en) Document signing method and device, computer equipment and storage medium
CN110555681A (en) Bank card signing method, device, server and medium
CN110929237A (en) Identity verification system, method and device and information verification system
CN109447825A (en) Method, apparatus, computer equipment and the storage medium of online declaration form processing
CN111667253B (en) Security processing method and device
EP3867781A1 (en) Systems and methods for enhanced authorization messages
CN113221529A (en) Event investigation method and device
CN106534041B (en) Verification method, verification platform and client
WO2016190812A1 (en) A computerized method and system of credit application and issuance thereof
US20220414652A1 (en) Prioritizing Holds When Selecting Transactions for Transaction-Based Knowledge-Based Authentication
US11677731B2 (en) Adaptive authentication
CN113255505A (en) Certificate photo generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant